Applied cyber security and the smart grid [[electronic resource] ] : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
| Applied cyber security and the smart grid [[electronic resource] ] : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor |
| Autore | Knapp Eric D |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Syngress, 2013 |
| Descrizione fisica | 1 online resource (225 p.) |
| Disciplina | 621.310285/58 |
| Altri autori (Persone) |
SamaniRaj
LangillJoel |
| Soggetto topico |
Smart power grids - Security measures
Computer networks - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-299-40881-8
0-12-404638-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary. |
| Record Nr. | UNINA-9910463232803321 |
Knapp Eric D
|
||
| Amsterdam ; ; Boston, : Elsevier/Syngress, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
| Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor |
| Autore | Knapp Eric D |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Syngress, 2013 |
| Descrizione fisica | 1 online resource (xxii, 202 pages) : illustrations (some color) |
| Disciplina | 621.310285/58 |
| Collana | Gale eBooks |
| Soggetto topico |
Smart power grids - Security measures
Computer networks - Security measures |
| ISBN |
1-299-40881-8
0-12-404638-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary. |
| Record Nr. | UNINA-9910786127803321 |
Knapp Eric D
|
||
| Amsterdam ; ; Boston, : Elsevier/Syngress, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
| Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor |
| Autore | Knapp Eric D |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Syngress, 2013 |
| Descrizione fisica | 1 online resource (xxii, 202 pages) : illustrations (some color) |
| Disciplina | 621.310285/58 |
| Collana | Gale eBooks |
| Soggetto topico |
Smart power grids - Security measures
Computer networks - Security measures |
| ISBN |
1-299-40881-8
0-12-404638-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary. |
| Record Nr. | UNINA-9910820595503321 |
Knapp Eric D
|
||
| Amsterdam ; ; Boston, : Elsevier/Syngress, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Federal cloud computing : the definitive guide for cloud service providers / / Matthew Metheny
| Federal cloud computing : the definitive guide for cloud service providers / / Matthew Metheny |
| Autore | Metheny Matthew |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Syngress, 2012 |
| Descrizione fisica | 1 online resource (461 p.) |
| Disciplina | 004.67/82 |
| Soggetto topico |
Cloud computing - Security measures
Web services - Government policy |
| ISBN |
9781283852302
1283852306 9781597497398 1597497398 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Machine generated contents note: Chapter 1 - Introduction to the Federal Cloud Computing Strategy Chapter 2 - Cloud Computing Standards Chapter 3 - A Case for Open Source Chapter 4 - Security and Privacy in Public Cloud Computing Chapter 5 - Applying the NIST Risk Management Framework Chapter 6 - Risk Management Chapter 7 - Comparison of FISMA with Other Security Compliance Standards Chapter 8 - FedRAMP Primer Chapter 9 - The FedRAMP Cloud Computing Security Requirements Chapter 10 - Assessment and Authorization (A&A): Governance, Preparation, and Execution Chapter 11 - Strategies for Continuous Monitoring Chapter 12 - Cost-Effective Compliance using Security Automation Appendix - Federal-focused Case Study for Cloud Service Providers using the CSA GRC Stack. |
| Record Nr. | UNINA-9911004765503321 |
Metheny Matthew
|
||
| Amsterdam ; ; Boston, : Elsevier/Syngress, 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Managing information security / / edited by John R. Vacca
| Managing information security / / edited by John R. Vacca |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Syngress, 2014 |
| Descrizione fisica | 1 online resource (xxiv, 347 pages) : illustrations (some color) |
| Disciplina | 005.8 |
| Collana | Gale eBooks |
| Soggetto topico |
Computer security - Management
Electronic data processing departments - Security measures Computer networks - Security measures |
| ISBN | 0-12-416694-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Managing Information Security; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Information Security Essentials for IT Managers; 1. Information Security Essentials for it Managers, Overview; Scope of Information Security Management; CISSP Ten Domains of Information Security; What is a Threat?; Common Attacks; Impact of Security Breaches; 2. Protecting Mission-Critical Systems; Information Assurance; Information Risk Management; Administrative, Technical, and Physical Controls; Risk Analysis; Defense in Depth
Contingency PlanningAn Incident Response (IR) Plan; Business Continuity Planning (BCP); 3. Information Security from the Ground Up; Physical Security; Facility Requirements; Administrative, Technical, and Physical Controls; Data Security; Data Classification; Access Control Models; Systems and Network Security; Host-Based Security; Network-Based Security; Intrusion Detection; Intrusion Prevention; Business Communications Security; General Rules for Self-Protection; Handling Protection Resources; Rules for Mobile IT Systems; Operation on Open Networks Additional Business Communications GuidelinesWireless Security; Access Control; Confidentiality; Integrity; Availability; Enhancing Security Controls; Web and Application Security; Web Security; Application Security; Security Policies and Procedures; Security Employee Training and Awareness; The Ten Commandments of SETA; 4. Security Monitoring and Effectiveness; Security Monitoring Mechanisms; Incidence Response and Forensic Investigations; Validating Security Effectiveness; Vulnerability Assessments and Penetration Tests; 5. Summary; Chapter Review Questions/Exercises; True/False Multiple ChoiceExercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2. Security Management Systems; 1. Security Management System Standards; 2. Training Requirements; 3. Principles of Information Security; 4. Roles and Responsibilities of Personnel; 5. Security Policies; 6. Security Controls; 7. Network Access; 8. Risk Assessment; 9. Incident Response; 10. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem 3. Information Technology Security Management1. Information Security Management Standards; Federal Information Security Management Act; International Standards Organization; 2. Other Organizations Involved in Standards; 3. Information Technology Security Aspects; Security Policies and Procedures; Security Organization Structure; End User; Executive Management; Security Officer; Data/Information Owners; Information System Auditor; Information Technology Personnel; Systems Administrator; IT Security Processes; Processes for a Business Continuity Strategy Processes for IT Security Governance Planning |
| Record Nr. | UNINA-9910790566603321 |
| Amsterdam ; ; Boston, : Elsevier/Syngress, 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Managing information security / / edited by John R. Vacca
| Managing information security / / edited by John R. Vacca |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Syngress, 2014 |
| Descrizione fisica | 1 online resource (xxiv, 347 pages) : illustrations (some color) |
| Disciplina | 005.8 |
| Collana | Gale eBooks |
| Soggetto topico |
Computer security - Management
Electronic data processing departments - Security measures Computer networks - Security measures |
| ISBN | 0-12-416694-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Managing Information Security; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Information Security Essentials for IT Managers; 1. Information Security Essentials for it Managers, Overview; Scope of Information Security Management; CISSP Ten Domains of Information Security; What is a Threat?; Common Attacks; Impact of Security Breaches; 2. Protecting Mission-Critical Systems; Information Assurance; Information Risk Management; Administrative, Technical, and Physical Controls; Risk Analysis; Defense in Depth
Contingency PlanningAn Incident Response (IR) Plan; Business Continuity Planning (BCP); 3. Information Security from the Ground Up; Physical Security; Facility Requirements; Administrative, Technical, and Physical Controls; Data Security; Data Classification; Access Control Models; Systems and Network Security; Host-Based Security; Network-Based Security; Intrusion Detection; Intrusion Prevention; Business Communications Security; General Rules for Self-Protection; Handling Protection Resources; Rules for Mobile IT Systems; Operation on Open Networks Additional Business Communications GuidelinesWireless Security; Access Control; Confidentiality; Integrity; Availability; Enhancing Security Controls; Web and Application Security; Web Security; Application Security; Security Policies and Procedures; Security Employee Training and Awareness; The Ten Commandments of SETA; 4. Security Monitoring and Effectiveness; Security Monitoring Mechanisms; Incidence Response and Forensic Investigations; Validating Security Effectiveness; Vulnerability Assessments and Penetration Tests; 5. Summary; Chapter Review Questions/Exercises; True/False Multiple ChoiceExercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2. Security Management Systems; 1. Security Management System Standards; 2. Training Requirements; 3. Principles of Information Security; 4. Roles and Responsibilities of Personnel; 5. Security Policies; 6. Security Controls; 7. Network Access; 8. Risk Assessment; 9. Incident Response; 10. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem 3. Information Technology Security Management1. Information Security Management Standards; Federal Information Security Management Act; International Standards Organization; 2. Other Organizations Involved in Standards; 3. Information Technology Security Aspects; Security Policies and Procedures; Security Organization Structure; End User; Executive Management; Security Officer; Data/Information Owners; Information System Auditor; Information Technology Personnel; Systems Administrator; IT Security Processes; Processes for a Business Continuity Strategy Processes for IT Security Governance Planning |
| Record Nr. | UNINA-9910815323303321 |
| Amsterdam ; ; Boston, : Elsevier/Syngress, 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Managing information security [[electronic resource] /] / edited by John R. Vacca
| Managing information security [[electronic resource] /] / edited by John R. Vacca |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Syngress, c2010 |
| Descrizione fisica | 1 online resource (372 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | VaccaJohn R |
| Soggetto topico |
Computer security - Management
Computer networks - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN | 0-12-416694-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Managing Information Security; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Information Security Essentials for IT Managers; 1. Information Security Essentials for it Managers, Overview; Scope of Information Security Management; CISSP Ten Domains of Information Security; What is a Threat?; Common Attacks; Impact of Security Breaches; 2. Protecting Mission-Critical Systems; Information Assurance; Information Risk Management; Administrative, Technical, and Physical Controls; Risk Analysis; Defense in Depth
Contingency PlanningAn Incident Response (IR) Plan; Business Continuity Planning (BCP); 3. Information Security from the Ground Up; Physical Security; Facility Requirements; Administrative, Technical, and Physical Controls; Data Security; Data Classification; Access Control Models; Systems and Network Security; Host-Based Security; Network-Based Security; Intrusion Detection; Intrusion Prevention; Business Communications Security; General Rules for Self-Protection; Handling Protection Resources; Rules for Mobile IT Systems; Operation on Open Networks Additional Business Communications GuidelinesWireless Security; Access Control; Confidentiality; Integrity; Availability; Enhancing Security Controls; Web and Application Security; Web Security; Application Security; Security Policies and Procedures; Security Employee Training and Awareness; The Ten Commandments of SETA; 4. Security Monitoring and Effectiveness; Security Monitoring Mechanisms; Incidence Response and Forensic Investigations; Validating Security Effectiveness; Vulnerability Assessments and Penetration Tests; 5. Summary; Chapter Review Questions/Exercises; True/False Multiple ChoiceExercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2. Security Management Systems; 1. Security Management System Standards; 2. Training Requirements; 3. Principles of Information Security; 4. Roles and Responsibilities of Personnel; 5. Security Policies; 6. Security Controls; 7. Network Access; 8. Risk Assessment; 9. Incident Response; 10. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem 3. Information Technology Security Management1. Information Security Management Standards; Federal Information Security Management Act; International Standards Organization; 2. Other Organizations Involved in Standards; 3. Information Technology Security Aspects; Security Policies and Procedures; Security Organization Structure; End User; Executive Management; Security Officer; Data/Information Owners; Information System Auditor; Information Technology Personnel; Systems Administrator; IT Security Processes; Processes for a Business Continuity Strategy Processes for IT Security Governance Planning |
| Record Nr. | UNISA-996426337003316 |
| Amsterdam ; ; Boston, : Elsevier/Syngress, c2010 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Managing information security [[electronic resource] /] / edited by John R. Vacca
| Managing information security [[electronic resource] /] / edited by John R. Vacca |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Syngress, c2010 |
| Descrizione fisica | 1 online resource (372 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | VaccaJohn R |
| Soggetto topico |
Computer security - Management
Computer networks - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN | 0-12-416694-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Managing Information Security; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Information Security Essentials for IT Managers; 1. Information Security Essentials for it Managers, Overview; Scope of Information Security Management; CISSP Ten Domains of Information Security; What is a Threat?; Common Attacks; Impact of Security Breaches; 2. Protecting Mission-Critical Systems; Information Assurance; Information Risk Management; Administrative, Technical, and Physical Controls; Risk Analysis; Defense in Depth
Contingency PlanningAn Incident Response (IR) Plan; Business Continuity Planning (BCP); 3. Information Security from the Ground Up; Physical Security; Facility Requirements; Administrative, Technical, and Physical Controls; Data Security; Data Classification; Access Control Models; Systems and Network Security; Host-Based Security; Network-Based Security; Intrusion Detection; Intrusion Prevention; Business Communications Security; General Rules for Self-Protection; Handling Protection Resources; Rules for Mobile IT Systems; Operation on Open Networks Additional Business Communications GuidelinesWireless Security; Access Control; Confidentiality; Integrity; Availability; Enhancing Security Controls; Web and Application Security; Web Security; Application Security; Security Policies and Procedures; Security Employee Training and Awareness; The Ten Commandments of SETA; 4. Security Monitoring and Effectiveness; Security Monitoring Mechanisms; Incidence Response and Forensic Investigations; Validating Security Effectiveness; Vulnerability Assessments and Penetration Tests; 5. Summary; Chapter Review Questions/Exercises; True/False Multiple ChoiceExercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2. Security Management Systems; 1. Security Management System Standards; 2. Training Requirements; 3. Principles of Information Security; 4. Roles and Responsibilities of Personnel; 5. Security Policies; 6. Security Controls; 7. Network Access; 8. Risk Assessment; 9. Incident Response; 10. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem 3. Information Technology Security Management1. Information Security Management Standards; Federal Information Security Management Act; International Standards Organization; 2. Other Organizations Involved in Standards; 3. Information Technology Security Aspects; Security Policies and Procedures; Security Organization Structure; End User; Executive Management; Security Officer; Data/Information Owners; Information System Auditor; Information Technology Personnel; Systems Administrator; IT Security Processes; Processes for a Business Continuity Strategy Processes for IT Security Governance Planning |
| Record Nr. | UNINA-9910452646003321 |
| Amsterdam ; ; Boston, : Elsevier/Syngress, c2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Managing information security / edited by John R. Vacca
| Managing information security / edited by John R. Vacca |
| Edizione | [2. ed.] |
| Pubbl/distr/stampa | Amsterdam ; Boston, : Elsevier/Syngress, 2010 |
| Descrizione fisica | Testo elettronico (PDF) (347 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | VACCA, John R |
| Soggetto topico | Sicurezza informatica |
| Formato | Risorse elettroniche |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996461152803316 |
| Amsterdam ; Boston, : Elsevier/Syngress, 2010 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||